Join thousands of people who receive the latest breaking cybersecurity news every day.
Calling it a form of “electronic civil disobedience,” hacktivist group Anonymous took aim at a special agent from the California Department of Justice on Friday. The group spilled 38,000 e-mails containing “computer forensics techniques, investigation protocols as well as highly embarrassing personal information,” according to a press release on Pastebin.
One of the big impediments to prosecuting computer crimes is getting law enforcement to pursue computer crimes with the same intensity that they do traditional property and violent crimes. But that’s easier said than done. At the recent B-Sides San Francisco Conference, Threatpost.com sat down with Nick Selby, a Managing Director at IT security consulting firm Trident Risk Management to talk about the gulf that separates the “guns and badges” folks from the world of IT security.
InfoSec Insider content is written by a trusted community of Threatpost cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
Sponsored Content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community. This content creates an opportunity for a sponsor to provide insight and commentary from their point-of-view directly to the Threatpost audience. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content.